WO2021249334A1 - 应用于网络安全防御系统的网络安全防御方法及相关装置 - Google Patents

应用于网络安全防御系统的网络安全防御方法及相关装置 Download PDF

Info

Publication number
WO2021249334A1
WO2021249334A1 PCT/CN2021/098595 CN2021098595W WO2021249334A1 WO 2021249334 A1 WO2021249334 A1 WO 2021249334A1 CN 2021098595 W CN2021098595 W CN 2021098595W WO 2021249334 A1 WO2021249334 A1 WO 2021249334A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
program
information system
security defense
cyberspace information
Prior art date
Application number
PCT/CN2021/098595
Other languages
English (en)
French (fr)
Inventor
贺磊
邬江兴
刘勤让
宋克
任权
周俊
傅敏
张伟丽
丁瑞浩
郭义伟
Original Assignee
国家数字交换系统工程技术研究中心
珠海高凌信息科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 国家数字交换系统工程技术研究中心, 珠海高凌信息科技股份有限公司 filed Critical 国家数字交换系统工程技术研究中心
Priority to US17/791,277 priority Critical patent/US20230033253A1/en
Publication of WO2021249334A1 publication Critical patent/WO2021249334A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • This application relates to the field of network security, and in particular to a network security defense method and related devices applied to a network security defense system.
  • the various computers and information and communication equipment of the cyberspace information system can be regarded as a certain expression of the Turing machine, which can accept, store and run a program that can be described by the Turing machine. Realize the described algorithm, therefore, the cyberspace information system can be abstracted as a reconfigurable memory channel with processing capabilities.
  • Cyber security defense is the basic requirement of cyberspace information systems.
  • the applicant discovered that based on the characteristic of memory, whether it is random disturbance or non-random disturbance, if at any moment, the disturbance causes the cyberspace information system to make an error, the reconfigurable memory based on the cyberspace information system Therefore, at a time after this time, the disturbance will definitely cause errors in the cyberspace information system. That is, the impact of disturbance on cyberspace information system is also memorable.
  • the applicant proposes a network security defense system, and the technical solution described in this application is a security defense method based on this system.
  • This application provides a security defense method and related devices applied to a network security defense system, with the purpose of solving the problem of improving the security of the cyberspace information system.
  • a security defense method applied to a network security defense system including:
  • Use memoryless technology in cyberspace information systems includes: technology that is not affected by generalized disturbances;
  • amnesticizing the programs running in the cyberspace information system includes:
  • the program in the cyberspace information system is solidified so that the logic of the program cannot be changed.
  • amnesticizing the programs running in the cyberspace information system includes:
  • the program in the cyberspace information system is solidified for the user so that the user cannot change the logic of the program.
  • amnesticizing the programs running in the cyberspace information system includes:
  • the program is replaced with the backup program.
  • performing amnestics on programs running in the cyberspace information system includes at least one of the following:
  • performing amnestics on the data in the cyberspace information system includes:
  • performing amnestics on the data in the cyberspace information system includes:
  • performing amnestics on the data in the cyberspace information system includes:
  • performing amnestics on the data in the cyberspace information system includes:
  • the data is initialized.
  • a security defense device applied to a network security defense system including:
  • the memoryless module is used to use memoryless technology in cyberspace information systems, and the memoryless technology includes: technology that is not affected by generalized disturbances;
  • the first amnestic module is configured to use redundancy and replacement mechanisms to eliminate the influence of time-related random disturbances on the cyberspace information system;
  • the second amnestic module is used to eliminate the influence of non-random disturbances on the cyberspace information system by amnesticizing the programs running in the cyberspace information system and/or the data in the cyberspace information system.
  • a security defense device applied to a network security defense system including a processor and a memory;
  • the memory is used to store a program, and the processor is used to run the program to implement the aforementioned security defense method applied to the network security defense system.
  • a computer-readable storage medium has a computer program stored thereon, and when the computer program runs on a computer, the above-mentioned security defense method applied to a network security defense system is realized.
  • a cyberspace information system including:
  • the logic module is used to implement logic functions based on memoryless technology or running programs
  • the storage module is used to store data
  • the amnestic module is used to execute the aforementioned security defense method applied to the network security defense system to eliminate the influence of generalized disturbances on the cyberspace information system.
  • the technical solution described in this application uses a memoryless technology in a cyberspace information system.
  • the memoryless technology includes technologies that are not affected by generalized disturbances. Use redundancy and replacement mechanisms to eliminate the memory of the cyberspace information system's impact on random disturbances, and eliminate the memory of the programs running in the cyberspace information system and/or the data in the cyberspace information system. Because memoryless technology used in cyberspace information systems is not affected by generalized disturbances, redundancy and replacement mechanisms are used to eliminate the impact of random disturbances on cyberspace information systems, and amnestics are used to eliminate the impact of cyberspace information systems on non-random disturbances. Therefore, this solution can block the erroneous memory of the cyberspace information system for generalized disturbances, including non-random disturbances and random disturbances, and achieve the purpose of improving the security of the cyberspace information system.
  • Figure 1 is a schematic diagram of the structure of the network security defense system
  • FIG. 2 is a flowchart of a security defense method applied to a network security defense system disclosed in an embodiment of the application;
  • FIG. 3 is a flowchart of yet another security defense method applied to a network security defense system disclosed in an embodiment of the application;
  • FIG. 4 is a schematic structural diagram of a cyberspace information system disclosed in an embodiment of this application.
  • Figure 2 is a security defense method applied to a network security defense system disclosed in an embodiment of the application, including the following steps:
  • the memoryless technology includes: technology that is not affected by generalized perturbation.
  • Generalized disturbances include random and/or non-random disturbances.
  • a memoryless technology can be used to make the cyberspace information system not be affected by generalized disturbances.
  • Memoryless technologies include, but are not limited to, quantum technology and spectroscopy (hardware).
  • quantum technology is used, based on the characteristics of quantum entanglement, and quantum-based data replication and distribution, which is not affected by generalized disturbances. .
  • quantum technology and spectroscopy are only examples of memoryless technology, and other existing technologies that are not subject to generalized perturbation can be used as the memoryless technology described in this embodiment. Not limited.
  • S202 Use redundancy and replacement mechanisms to eliminate the memory of the cyberspace information system's impact on random disturbances.
  • the influence of random disturbance refers to the influence of random disturbance on the cyberspace information system.
  • Random disturbances include at least: the use of hardware or software is too long, and the reliability is reduced.
  • This embodiment aims at the influence of random disturbance on the cyberspace information system, and uses redundancy and replacement mechanisms to eliminate the memory of the cyberspace information system on the influence of random disturbances.
  • Redundancy and replacement mechanism refers to the use of redundant (for example, multiple) hardware and/or software, after one (at the same time, only one is used, and the other is used as a redundant backup) problem occurs, the other is used to replace the reduced reliability Hardware and/or software to improve reliability.
  • voting devices hardware
  • voting devices have their own lifespan, so as time delays, their reliability decreases.
  • multiple voting devices that is, redundant mechanisms
  • Voting devices used online In the event of a failure, use backup to replace the voting device used on the line (ie replacement mechanism) to improve reliability and eliminate the influence of random disturbances.
  • S203 Eliminate the memory of the cyberspace information system on the influence of non-random disturbances by amnesticizing the programs running in the cyberspace information system and/or the data in the cyberspace information system.
  • the non-random disturbance causes interference to the program and/or data in the cyberspace information system, causing errors in program operation results and/or data.
  • Non-random disturbance includes at least man-made disturbance.
  • Non-random disturbance influence refers to the influence of non-random disturbance on cyberspace information system. For example, disturbances caused by artificially implanted viruses cause errors in the program operation results and/or data in the cyberspace information system.
  • the programs running in the cyberspace information system may include, but are not limited to: data transmission programs, domain name service programs, routing and exchange programs, web service programs, file storage programs, and firewall programs.
  • amnestics are performed on the programs running in the cyberspace information system, which specifically refers to the elimination of the memory of the programs running in the cyberspace information system that are affected by non-random disturbances.
  • the data stored in the cyberspace information system includes, but is not limited to: configuration data, business data, and user data.
  • amnestics are performed on the data in the cyberspace information system, which specifically refers to the elimination of the memory that the data in the cyberspace information system has affected by non-random disturbances.
  • the network security defense method uses memoryless technology in the cyberspace information system, uses redundancy and replacement mechanisms, and through the use of the cyberspace information system
  • the running program and/or data in the cyberspace information system are amnesticized.
  • the redundancy and replacement mechanism is used to eliminate the memory of the cyberspace information system on random disturbances, and the program and/or data are amnesticized to eliminate cyberspace.
  • the three steps in this embodiment eliminate the elimination of generalized disturbances by cyberspace information systems from different perspectives, forming an organic whole: Although memoryless technology is not affected by generalized disturbances, it is not cyberspace. Each link in the information system is equipped with memoryless technology. Therefore, from the perspective of random disturbances, the steps of redundancy and replacement mechanisms are proposed. From the perspective of non-random disturbances, the elimination of procedures and/or data Amnestics steps affected by disturbances. The three steps complement each other.
  • the above three steps can be used as the strategy of the amnestic module in Figure 1, pre-configured in the amnestic module, and configured in other modules with corresponding software and/or hardware, to achieve each of the above amnestic steps through cooperation.
  • amnestics mentioned in S203 can at least be used to eliminate the memory of the cyberspace information system on non-random disturbances, and avoid errors caused by non-random disturbances in the cyberspace information system.
  • Figure 3 illustrates the specific implementation of amnestics provided in this embodiment. As shown in Figure 3, amnestics includes but is not limited to the following two specific implementations.
  • the first method of amnestics is to eliminate the memory that is affected by non-random disturbances on the programs running in the cyberspace information system by amnesticizing the programs running in the cyberspace information system.
  • the specific implementation of amnestics for a specific program includes the following S301 to S306.
  • S301 Solidify the program in the cyberspace information system so that the logic of the program cannot be changed.
  • an example of a specific implementation manner of curing the program in the cyberspace information system is: curing the program in a chip.
  • the front-end agent's copying and distributing program has simple functions and can be run on the chip in a logically solidified manner to prevent the program from being tampered with.
  • S302 Curing the program in the cyberspace information system for the user so that the user cannot change the logic of the program.
  • the program can be solidified so that users cannot change the logic of the program.
  • developers can use modification tools such as FPGA, SGX, and trust zoom to modify the logic of the program.
  • the curing method can refer to the prior art.
  • S303 Compare the program and the backup program of the program, and use the backup program to replace the program in response to the logic difference between the program and the backup program.
  • the trigger timing of the comparison program and the backup program of the program can be preset.
  • the backup program of the comparison program and the program can be preset according to the preset cycle, or the trigger timing can be preset to receive the calling program.
  • the trigger timing of replacing the program with the backup program can be preset.
  • the trigger timing can be preset to be the moment when the comparison result indicates that there is a difference between the program and the backup program, or the trigger timing can be preset to be the end of program operation.
  • the backup program is used to replace the program.
  • a web page program can be compared with its backed-up source program, and once inconsistencies are found, the current backup program or other heterogeneous normal programs are enabled to block errors caused by tampering of the web page program.
  • S305 Real-time or non-real-time verification program based on preset verification method.
  • S306 Real-time or non-real-time error correction program based on preset encryption or error correction coding.
  • the trigger timing of the verification or error correction program can be preset.
  • the verification or error correction program can be preset according to the preset period, or the trigger timing can be preset to receive the instruction to call the program.
  • the trigger timing of the initialization program can be preset.
  • the trigger timing can be preset to be the moment when the verification result indicates the program change, or the trigger timing can be preset to be the end of the program operation.
  • the web page program is verified based on the preset verification code in the web page program. Once the web page program is found to be changed, the web page program is restored to block errors caused by tampering of the web page program.
  • S301 to S306 are six optional implementations of amnestics for programs running in the cyberspace information system. In practice, at least one of the foregoing implementation manners can be used to eliminate the influence of non-random disturbances on the program.
  • the second method of amnestics is to eliminate the memory that is affected by non-random disturbances on the data in the cyberspace information system by amnesticizing the data in the cyberspace information system.
  • eliminating the impact of non-random disturbances on data can be divided into two categories: 1: directly processing the data itself. 2: Realize the processing of data by processing the data storage space.
  • the specific implementation of amnestics for specific data includes the following S307 to S310.
  • the method of initializing data includes but is not limited to a data rollback operation.
  • the data storage space is initialized according to a preset initialization rule.
  • the initialization rule at least indicates the initialization time, which can be set according to actual needs.
  • the initialization rule indicates that before the data is used, the storage space of the data is initialized so that the data is not affected by the non-random disturbance before the current use.
  • the initialization rule indicates that after the data is used, the storage space of the data is initialized, so that the data after the current use is not affected by the non-random disturbance during the current use.
  • the configuration data in the DNS domain name resolution system is compared non-periodically. Once an abnormality is found, the original configuration data is restored to achieve amnestics, and the initialized data is called.
  • clearing the storage space of data refers to deleting data in the storage space. It should be noted that in practical applications, different users can correspond to different storage spaces, and this step can clean up the storage spaces of each user separately.
  • the storage space corresponding to different users is different, and the storage space corresponding to each user is amnesticized in a preset period or in response to a preset condition.
  • the central controller will clean up the storage space of each user in a preset period to prevent information leakage. Or, once a network security incident (an example of a preset condition) occurs, the central controller can also quickly eliminate all users' confidential data.
  • S309 Compare the data and the backup data of the data, and replace the data with the backup data in response to the difference between the data and the backup data.
  • S310 Based on a preset check in the data: encryption or error correction coding, check or error correction data, and initialize the data in response to the check result indicating the data change.
  • S307 to S310 are four optional implementation manners for amnesticizing the data in the cyberspace information system.
  • at least one of the foregoing implementation manners can be used to eliminate the influence of non-random disturbances on data.
  • this embodiment eliminates the memory of the cyberspace information system from the effects of non-random disturbances by amnesticizing the programs running in the cyberspace information system and/or data in the cyberspace information system Compared with the existing “patching” and other “post-remediation” methods, in this embodiment, the applicant can abstract from the cyberspace information system as a reconfigurable memory channel with processing capabilities, and innovatively propose The non-random perturbation is also based on the principle of memory for errors caused by the interference of the reconfigurable memory channel. By eliminating the non-random perturbation on the program and data of the cyberspace information system, the cyberspace information caused by the non-random perturbation is blocked. Systematic errors improve the security of cyberspace information systems.
  • FIG. 3 each specific implementation shown in FIG. 3 is based on the prior art, so those skilled in the art can implement engineering implementations under the enlightenment of FIG. 1 and FIG. 3, which will not be repeated here.
  • Figure 4 is a cyberspace information system disclosed in an embodiment of the application, which includes a logic module, a storage module, and an amnestic module.
  • the logic module is used to implement logic functions based on memoryless technology or running programs, and the specific functions can be referred to the prior art.
  • the storage module is used to store various data generated or used by network communication. Further, the storage module may include multiple storage spaces, different storage spaces correspond to different users, and a storage space corresponding to any one user is used to store data of the user.
  • the amnestic module is used to amnestics the programs running in the functional module and the data stored in the storage module. For the specific implementation of the function of the amnestic module, please refer to the method embodiment shown in FIG. 2 or FIG. 3, which will not be repeated here.
  • the cyberspace information system shown in Figure 4 can block errors caused by generalized disturbances through amnestics, thereby improving security. Moreover, it can be understood that the cyberspace information system shown in Figure 4 has an amnestic module, so it avoids errors caused by generalized disturbances, does not need to rely on external software or hardware, and has internal security.
  • the embodiment of the present application also discloses a security defense device applied to a network security defense system, including: a memoryless module, a first amnestic module, and a second amnestic module.
  • the memoryless module is used to use the memoryless technology in the cyberspace information system.
  • the memoryless technology includes: technology that is not affected by generalized disturbances.
  • the first amnestic module is used to use redundancy and replacement mechanisms to eliminate the impact of time-related random disturbances on the cyberspace information system.
  • the second amnestic module is used to eliminate the influence of non-random disturbances on the cyberspace information system by amnesticizing the programs running in the cyberspace information system and/or data in the cyberspace information system.
  • the security defense device of the cyberspace information system improves the performance of the cyberspace information system by using memoryless technology in the cyberspace information system, using redundancy and replacement mechanisms, and amnesticizing the programs and data of the cyberspace information system. safety.
  • An embodiment of the application also discloses a network security defense device applied to a network security defense system, including a processor and a memory, the memory is used to store a program, and the processor is used to run the program to implement the foregoing network security defense method Or network security defense effectiveness evaluation method.
  • the embodiment of the present application also discloses a computer-readable storage medium on which a computer program is stored, and when the computer program runs on a computer, the above-mentioned network security defense method or the network security defense effect evaluation method is implemented.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)

Abstract

本申请提供的技术方案,在网络安全防御系统中使用无记忆技术,无记忆技术包括:不受广义扰动影响的技术。使用冗余和替换机制,消除网络安全防御系统对随机扰动影响的记忆,通过对网络安全防御系统中运行的程序和/或网络安全防御系统中的数据进行记忆消除。因为,无记忆技术用于网络安全防御系统不受广义扰动影响,冗余和替换机制用于消除随机扰动对网络安全防御系统影响的记忆,记忆消除用于消除网络安全防御系统对非随机扰动影响的记忆,所以,本方案能够阻断网络安全防御系统对于广义扰动,包括非随机扰动和随机扰动,导致的错误的记忆,实现提高网络安全防御系统的安全性的目的。

Description

应用于网络安全防御系统的网络安全防御方法及相关装置
本申请要求于2020年06月09日提交中国专利局、申请号为202010526523.5、发明名称为“应用于网络安全防御系统的网络安全防御方法及相关装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络安全领域,尤其涉及一种应用于网络安全防御系统的网络安全防御方法及相关装置。
背景技术
就一般意义而言,网络空间信息系统的各种计算机、和信息与通信设备都可以视为图灵机的某种表达,可以接受、存储和运行一段能用图灵机描述的程序,运行该程序可实现所描述的算法,因此,网络空间信息系统可以抽象为,一种有处理能力的可重构有记忆信道。
网络安全防御为网络空间信息系统的基本需求。
发明内容
申请人在研究的过程中发现,基于有记忆这一特点,无论是随机扰动还是非随机扰动,如果在任一时刻,扰动导致网络空间信息系统出错,基于网络空间信息系统的可重构有记忆的特点,所以,在该时刻之后的时刻,扰动一定会导致网络空间信息系统出错。即,扰动对网络空间信息系统的影响也是有记忆的。
因此,可以跳出现有的安全防御方式“事后补救”的修复式防御思维定式,从消除网络空间信息系统的记忆的方向,提高网络空间信息系统的安全性。因此,申请人提出了一种网络安全防御系统,本申请所述的技术方案,为基于此系统,提出的安全防御方法。
本申请提供了一种应用于网络安全防御系统的安全防御方法及相关装置,目的在于解决提高网络空间信息系统的安全性的问题。
为了实现上述目的,本申请提供了以下技术方案:
一种应用于网络安全防御系统的安全防御方法,包括:
在网络空间信息系统中使用无记忆技术,所述无记忆技术包括:不受广义扰动影响的技术;
使用冗余和替换机制,消除所述网络空间信息系统对随机扰动影响的记忆;
通过对所述网络空间信息系统中运行的程序和/或所述网络空间信息系统中的数据进行记忆消除,消除所述网络空间信息系统对非随机扰动影响的记忆。
可选地,对所述网络空间信息系统中运行的程序进行记忆消除,包括:
固化所述网络空间信息系统中的程序,使得所述程序的逻辑不可更改。
可选地,对所述网络空间信息系统中运行的程序进行记忆消除,包括:
对使用者固化所述网络空间信息系统中的程序,使得所述使用者不可更改所述程序的逻辑。
可选地,对所述网络空间信息系统中运行的程序进行记忆消除,包括:
对比所述程序和所述程序的备份程序;
响应于所述程序与所述备份程序的逻辑不同,使用所述备份程序替换所述程序。
可选地,对所述网络空间信息系统中运行的程序进行记忆消除,包括以下至少一项:
基于所述程序中预设的恢复方法,周期性或非周期性恢复所述程序;
基于预设的校验方法,实时或非实时校验所述程序;
基于预设的加密或纠错编码,实时或非实时纠错所述程序。
可选地,对所述网络空间信息系统中的数据进行记忆消除,包括:
初始化所述数据的存储空间。
可选地,对所述网络空间信息系统中的数据进行记忆消除,包括:
清理所述数据的存储空间。
可选地,对所述网络空间信息系统中的数据进行记忆消除,包括:
对比所述数据与所述数据的备份数据;
响应于所述数据与所述备份数据不同,使用所述备份数据替换所述数据。
可选地,对所述网络空间信息系统中的数据进行记忆消除,包括:
基于所述数据中预设的校验、加密或纠错编码,校验或纠错所述数据;
响应于校验结果指示所述数据更改,初始化所述数据。
一种应用于网络安全防御系统的安全防御装置,包括:
无记忆模块,用于在网络空间信息系统中使用无记忆技术,所述无记忆技术包括:不受广义扰动影响的技术;
第一记忆消除模块,用于使用冗余和替换机制,消除时间相关的随机扰动对所述网络空间信息系统的影响;
第二记忆消除模块,用于通过对所述网络空间信息系统中运行的程序和/或所述网络空间信息系统中的数据进行记忆消除,消除非随机扰动对所述网络空间信息系统的影响。
一种应用于网络安全防御系统的安全防御设备,包括处理器和存储器;
所述存储器用于存储程序,所述处理器用于运行所述程序,实现上述应用于网络安全防御系统的安全防御方法。
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序在计算机上运行时,实现上述应用于网络安全防御系统的安全防御方法。
一种网络空间信息系统,包括:
逻辑模块、存储模块和记忆消除模块;
所述逻辑模块用于基于无记忆技术或运行程序实现逻辑功能;
所述存储模块用于存储数据;
所述记忆消除模块用于,执行上述应用于网络安全防御系统的安全防御方法,以消除广义扰动对所述网络空间信息系统的影响。
本申请所述的技术方案,在网络空间信息系统中使用无记忆技术,无记忆技术包括:不受广义扰动影响的技术。使用冗余和替换机制,消除网络空间信息系统对随机扰动影响的记忆,通过对网络空间信息系统中运行的程序和/或网络空间信息系统中的数据进行记忆消除。因为,无记忆技术用于网络空间信息系统不受广义扰动影响,冗余和替换机制用于消除随机扰动对网络空间信息系统影响的记忆,记忆消除用于消除网络空间信息系统对非随机扰动影响的记忆,所以,本方案能够阻断网络空间信息系统对于广义扰动,包括非随机扰动和随机扰动,导致的错误的记忆,实现提高网络空间信息系统的安全性的目的。
附图说明
为了更消除地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为网络安全防御系统的结构示意图;
图2为本申请实施例公开的一种应用于网络安全防御系统的安全防御方法的流程图;
图3为本申请实施例公开的又一种应用于网络安全防御系统的安全防御方法的流程图;
图4为本申请实施例公开的一种网络空间信息系统的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行消除、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
为了提高网络空间信息系统的安全性,申请人提出了一种针对网络空间信息系统的网络安全防御系统,如图1所示,其亮点在于:记忆消除和内生安全性。本申请实施例公开的技术方案,在图1的基础上,提供了记忆消除的具体技术手段。
图2为本申请实施例公开的一种应用于网络安全防御系统的安全防御方法,包括以下步骤:
S201:在网络空间信息系统中使用无记忆技术。
本实施例中,无记忆技术包括:不受广义扰动影响的技术。广义扰动包括随机和/或非随机扰动。
本实施例中,可以使用无记忆技术使得网络空间信息系统不受广义扰动影响。无记忆技术包括但不限于量子技术和分光器(硬件),例如,在网络数据的复制分发场景下,使用量子技术,基于量子纠缠的特性,基于量子的数据复制分发,不受广义扰动的影响。
需要说明的是,量子技术和分光器(硬件)仅为无记忆技术的示例,现有的不受广义扰动的其它技术,均可作为本实施例所述的无记忆技术,对此本实施例不做限定。
S202:使用冗余和替换机制,消除网络空间信息系统对随机扰动影响的记忆。
随机扰动影响是指随机扰动对网络空间信息系统的影响。
随机扰动至少包括:硬件或软件的使用时间过长,而导致的可靠性降低。本实施例针对于随机扰动对网络空间信息系统影响,使用冗余和替换机制,消除网络空间信息系统对随机扰动影响的记忆。
冗余和替换机制是指,使用冗余(例如多个)硬件和/或软件,在一个(同一时刻,只使用一个,其它作为冗余备份)出现问题后,使用另一个替换掉可靠性降低的硬件和/或软件,以提高可靠性。
以表决器(硬件)为例,表决器因为自身有寿命,所以,随着时间的推迟, 可靠性降低,针对此情况,设置多个表决器(即冗余机制),在线上使用的表决器故障的情况下,使用备份替换线上使用的表决器(即替换机制),提高可靠性,即可消除随机扰动的影响。
S203:通过对网络空间信息系统中运行的程序和/或网络空间信息系统中的数据进行记忆消除,消除网络空间信息系统对非随机扰动影响的记忆。
本实施例中,非随机扰动对网络空间信息系统中的程序和/或数据造成干扰,使得程序运行结果和/或数据产生错误。非随机扰动至少包括人为扰动,非随机扰动影响是指,非随机扰动对网络空间信息系统的影响。例如,人为植入的病毒造成的扰动,使得网络空间信息系统中程序运行结果和/或数据产生错误。
具体的,网络空间信息系统中运行的程序可以包括但不限于:数据传输程序、域名服务程序、路由与交换程序、web服务程序、文件存储程序、以及防火墙程序。本步骤中,对网络空间信息系统中运行的程序进行记忆消除,具体是指,消除网络空间信息系统中运行的程序对非随机扰动影响的记忆。
网络空间信息系统中存储的数据包括但不限于:配置数据、业务数据、以及用户数据等。本步骤中,对网络空间信息系统中的数据进行记忆消除,具体是指,消除网络空间信息系统中的数据对非随机扰动影响的记忆。
需要说明的是,对于具体程序的记忆消除的具体实现方式,以及具体数据的记忆消除的具体实现方式,将在以下实施例中进行详细说明。
进一步需要说明的是,上述S201~S203为网络安全防御方法的3个实现步骤,但是,本实施例不限定3个步骤之间的先后顺序。
由上述实施例所述的技术方案可以看出,本申请实施例提供的网络安全防 御方法,在网络空间信息系统中使用无记忆技术,使用冗余和替换机制,并通过对网络空间信息系统中运行的程序和/或网络空间信息系统中的数据进行记忆消除。因为,无记忆技术使得网络空间信息系统不受广义扰动影响,冗余和替换机制用于消除网络空间信息系统对随机扰动影响的记忆,对程序和/或数据进行记忆消除,用于消除网络空间信息系统对非随机扰动影响的记忆。所以,本方案能够阻断网络空间信息系统对于广义扰动导致的错误的记忆(即错误的积累),实现提高网络空间信息系统的安全性的目的。
需要强调的是,本实施例中的三个步骤,从不同的角度消除网络空间信息系统对广义扰动的消除,构成一个有机的整体:虽然无记忆技术不受广义扰动的影响,但并非网络空间信息系统中的各个环节,都具备无记忆技术,因此,又从针对随机扰动的角度,提出冗余和替换机制的步骤,从针对非随机扰动的角度,提出消除程序和/或数据对于非随机扰动影响的记忆消除步骤。三个步骤互为补充。
并且,创新性地提出了通过记忆消除方式,提高网络空间信息系统的安全性。
以上三个步骤,可以作为图1中记忆消除模块的策略,预先配置在记忆消除模块中,并在其它模块中配置相应的软件和/或硬件,通过协作实现以上各个记忆消除步骤。
需要说明的是,S203中提及的记忆消除至少可以用于消除网络空间信息系统对非随机扰动影响的记忆,避免网络空间信息系统受到非随机扰动而导致的错误。图3示例了本实施例提供的记忆消除的具体实现方式。如图3所示, 记忆消除包括但不限于下述两种具体实施方式。
第一种记忆消除的方法为:通过对网络空间信息系统中运行的程序进行记忆消除,消除非随机扰动对网络空间信息系统中运行的程序影响的记忆。
具体地,对于具体程序的记忆消除的具体实现方式包括下述S301~S306。
S301:固化网络空间信息系统中的程序,使得程序的逻辑不可更改。
本实施例中,固化网络空间信息系统中的程序的一种具体实现方式的举例为:将程序固化在芯片中。例如,前端代理的复制分发程序,功能简单,可以通过逻辑固化的方式运行在芯片中,防止程序被篡改。
S302:对使用者固化网络空间信息系统中的程序,使得使用者不可更改程序的逻辑。
具体地,可以将程序固化,使得使用者不可更改程序的逻辑,但是,开发者可以使用例如FPGA、SGX、和trust zoom等更改工具,对程序的逻辑进行更改。其中,固化方法可以参考现有技术。
S303:对比程序和程序的备份程序,响应于程序与备份程序的逻辑不同,使用备份程序替换程序。
需要说明的是,对比程序和程序的备份程序的触发时机可以预先设置,可选地,可以预先设置按照预设的周期对比程序和程序的备份程序,也可以预先设置触发时机为接收到调用程序的指令。使用备份程序替换程序的触发时机可以预先设置,可选地,可以预先设置触发时机为对比结果指示程序与备份程序之间存在差异的即刻,也可以预先设置触发时机为程序运行结束。
下述A1~A2为S303的可选的一种具体实现方式。
A1、响应于调用程序的指令,对比程序与程序的备份程序,得到对比结 果。
A2、响应于对比结果指示程序与备份程序之间存在差异,使用备份程序替换程序。
例如,可以对于web网页程序与其备份的源程序进行对比,一旦发现不一致,则启用当前备份程序或其他异构的正常程序,以阻断web网页程序被篡改导致的错误。
S304:基于程序中预设的恢复方法,周期性或非周期性恢复程序。
S305:基于预设的校验方法,实时或非实时校验程序。
S306:基于预设的加密或纠错编码,实时或非实时纠错程序。
需要说明的是,校验或纠错程序的触发时机可以预先设置,可选地,可以预先设置按照预设的周期校验或纠错程序,也可以预先设置触发时机为接收到调用程序的指令。初始化程序的触发时机可以预先设置,可选地,可以预先设置触发时机为校验结果指示程序更改的即刻,也可以预先设置触发时机为程序运行结束。
例如,对于web网页程序,基于web网页程序中预设的校验编码,校验web网页程序,一旦发现web网页程序更改,则恢复web网页程序,以阻断web网页程序被篡改导致的错误。
需要说明的是,S301~S306为对网络空间信息系统中运行的程序进行记忆消除的可选的6种实现方式。实际中,可以采用上述实现方式中的至少一种,以消除非随机扰动对程序的影响。
第二种记忆消除的方法为:通过对网络空间信息系统中的数据进行记忆消除,消除非随机扰动对网络空间信息系统中的数据影响的记忆。
具体地,消除非随机扰动对数据的影响可以分为两类:1:直接对数据本身进行处理。2:通过对数据存储空间进行处理,实现对数据的处理。对于具体数据的记忆消除的具体实现方式包括下述S307~S310。
S307:初始化数据的存储空间。
本实施例中,初始化数据的方法包括但不限于数据卷回操作,需要说明的是,本实施例中按照预设的初始化规则初始化数据的存储空间。其中,初始化规则至少指示初始化的时间,可以根据实际需要进行设置。例如,初始化规则指示,在使用数据之前,对数据的存储空间进行初始化,使得数据不受本次使用之前的非随机扰动的影响。或者,初始化规则指示,在使用数据之后,对数据的存储空间进行初始化,使得本次使用之后的数据不受本次使用过程中的非随机扰动的影响。
例如,响应于调用数据的指令,对DNS域名解析系统中的配置数据进行非周期的比对,一旦发现异常,恢复原始配置数据实现记忆消除,并调用初始化后的数据。
S308:清理数据的存储空间。
本实施例中,清理数据的存储空间指的是删除存储空间中的数据。需要说明的是,在实际应用中,不同用户可以对应不同存储空间,本步骤可以分别清理各个用户的存储空间。
具体地,不同用户对应的存储空间不同,且,各个用户对应的存储空间,以预设周期或者响应于预设条件进行记忆消除。
例如,网络空间信息系统中注册有不同的用户,且受中央控制器管理,中央控制器会以预设周期对各用户的存储空间进行清理,防止信息泄露。或者, 一旦发生网络安全事件(预设条件的一种示例),中央控制器也可快速消除所有用户的涉密数据。
S309:对比数据与数据的备份数据,响应于数据与备份数据不同,使用备份数据替换数据。
需要说明的是,本步骤的实现方式可以参照上述S303,将程序替换为数据即可。
S310:基于数据中预设的校验:加密或纠错编码,校验或纠错数据,响应于校验结果指示数据更改,初始化数据。
需要说明的是,本步骤的实现方式可以参照上述S306,将程序替换为数据即可。
需要说明的是,S307~S310为对网络空间信息系统中的数据进行记忆消除的可选的四种实现方式。实际中,可以采用上述实现方式中的至少一种,以消除非随机扰动对数据的影响。
进一步需要说明的是,以上各个步骤可以任意组合使用,这里不做限定。并且,可以使用硬件方式(例如FPGA)、软件方式、或者软硬件结合的方式实现上述各个具体步骤,这里也不做限定。
从上述实施例提供的方案可以看出,本实施例通过对网络空间信息系统中运行的程序和/或网络空间信息系统中的数据进行记忆消除,消除网络空间信息系统对非随机扰动影响的记忆,与现有的“打补丁”等“事后补救”的方式相比,本实施例中,申请人从网络空间信息系统可以抽象为有处理能力的可重构有记忆信道,以及创新性地提出的非随机扰动对于可重构有记忆信道的干扰导致的错误也是有记忆的原理出发,通过消除非随机扰动对网络空间信息系统 的程序和数据的方式,阻断非随机扰动导致的网络空间信息系统的错误,提高网络空间信息系统的安全性。
需要强调的是,虽然图3所示的各个步骤是现有技术,但将这些步骤或者步骤的组合应用于网络安全防御,尤其是应用在图1所示的架构下,是发明人提出的创新性的成果,理由如前所述的引理。也就是说,发明人基于研究过程中得出的引理,创新性地将上述步骤组合,用以解决网络空间信息系统的安全问题。
需要说明的是,图3中所示的各个具体实现方式,因为是现有技术,所以本领域人员能够在图1以及图3的启示下,进行工程实现,这里不再赘述。
图4为本申请实施例公开的一种网络空间信息系统,包括逻辑模块、存储模块和记忆消除模块。
其中,逻辑模块用于基于无记忆技术或运行程序实现逻辑功能,具体功能可以参见现有技术。存储模块用于存储网络通信产生或使用的各类数据。进一步的,存储模块可以包括多个存储空间,不同存储空间对应不同的用户,任意一个用户对应的存储空间,用于存储该用户的数据。记忆消除模块用于对功能模块中运行的程序以及存储模块中存储的数据,进行记忆消除。记忆消除模块的功能的具体实现方式,可以参见图2或图3所示的方法实施例,这里不再赘述。
图4所示的网络空间信息系统,能够通过记忆消除的方式,阻断广义扰动导致的错误,从而提高安全性。并且,可以理解的是,图4所示的网络空间信息系统,因为具有记忆消除模块,所以,避免广义扰动导致的错误,无需依赖 外源性软件或硬件,而具有内源安全性。
本申请实施例还公开了一种应用于网络安全防御系统的安全防御装置,包括:无记忆模块、第一记忆消除模块和第二记忆消除模块。其中,无记忆模块用于在网络空间信息系统中使用无记忆技术,无记忆技术包括:不受广义扰动影响的技术。第一记忆消除模块用于使用冗余和替换机制,消除时间相关的随机扰动对网络空间信息系统的影响。第二记忆消除模块用于通过对网络空间信息系统中运行的程序和/或网络空间信息系统中的数据进行记忆消除,消除非随机扰动对网络空间信息系统的影响。
所述网络空间信息系统的安全防御装置,通过在网络空间信息系统中使用无记忆技术、使用冗余和替换机制以及对网络空间信息系统的程序和数据进行记忆消除,以提高网络空间信息系统的安全性。
本申请实施例还公开了一种应用于网络安全防御系统的网络安全防御设备,包括处理器和存储器,储器用于存储程序,所述处理器用于运行所述程序,以实现上述网络安全防御方法或者网络安全防御效果评估方法。
本申请实施例还公开了计算机可读存储介质,其上存储有计算机程序,在所述计算机程序在计算机上运行时,实现上述网络安全防御方法或者网络安全防御效果评估方法。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的, 本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (13)

  1. 一种应用于网络安全防御系统的安全防御方法,其特征在于,包括:
    在网络空间信息系统中使用无记忆技术,所述无记忆技术包括:不受广义扰动影响的技术;
    使用冗余和替换机制,消除所述网络空间信息系统对随机扰动影响的记忆;
    通过对所述网络空间信息系统中运行的程序和/或所述网络空间信息系统中的数据进行记忆消除,消除所述网络空间信息系统对非随机扰动影响的记忆。
  2. 根据权利要求1所述的方法,其特征在于,对所述网络空间信息系统中运行的程序进行记忆消除,包括:
    固化所述网络空间信息系统中的程序,使得所述程序的逻辑不可更改。
  3. 根据权利要求1所述的方法,其特征在于,对所述网络空间信息系统中运行的程序进行记忆消除,包括:
    对使用者固化所述网络空间信息系统中的程序,使得所述使用者不可更改所述程序的逻辑。
  4. 根据权利要求1所述的方法,其特征在于,对所述网络空间信息系统中运行的程序进行记忆消除,包括:
    对比所述程序和所述程序的备份程序;
    响应于所述程序与所述备份程序的逻辑不同,使用所述备份程序替换所述程序。
  5. 根据权利要求1所述的方法,其特征在于,对所述网络空间信息系统 中运行的程序进行记忆消除,包括以下至少一项:
    基于所述程序中预设的恢复方法,周期性或非周期性恢复所述程序;
    基于预设的校验方法,实时或非实时校验所述程序;
    基于预设的加密或纠错编码,实时或非实时纠错所述程序。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,对所述网络空间信息系统中的数据进行记忆消除,包括:
    初始化所述数据的存储空间。
  7. 根据权利要求1-5任一项所述的方法,其特征在于,对所述网络空间信息系统中的数据进行记忆消除,包括:
    清理所述数据的存储空间。
  8. 根据权利要求1-5任一项所述的方法,其特征在于,对所述网络空间信息系统中的数据进行记忆消除,包括:
    对比所述数据与所述数据的备份数据;
    响应于所述数据与所述备份数据不同,使用所述备份数据替换所述数据。
  9. 根据权利要求1-5任一项所述的方法,其特征在于,对所述网络空间信息系统中的数据进行记忆消除,包括:
    基于所述数据中预设的校验、加密或纠错编码,校验或纠错所述数据;
    响应于校验结果指示所述数据更改,初始化所述数据。
  10. 一种应用于网络安全防御系统的安全防御装置,其特征在于,包括:
    无记忆模块,用于在网络空间信息系统中使用无记忆技术,所述无记忆技术包括:不受广义扰动影响的技术;
    第一记忆消除模块,用于使用冗余和替换机制,消除时间相关的随机扰动 对所述网络空间信息系统的影响;
    第二记忆消除模块,用于通过对所述网络空间信息系统中运行的程序和/或所述网络空间信息系统中的数据进行记忆消除,消除非随机扰动对所述网络空间信息系统的影响。
  11. 一种应用于网络安全防御系统的安全防御设备,其特征在于,包括处理器和存储器;
    所述存储器用于存储程序,所述处理器用于运行所述程序,实现权利要求1-9任一项所述的应用于网络安全防御系统的安全防御方法。
  12. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序在计算机上运行时,实现权利要求1-9任一项所述的应用于网络安全防御系统的安全防御方法。
  13. 一种网络空间信息系统,其特征在于,包括:
    逻辑模块、存储模块和记忆消除模块;
    所述逻辑模块用于基于无记忆技术或运行程序实现逻辑功能;
    所述存储模块用于存储数据;
    所述记忆消除模块用于,执行权利要求1-9任一项所述的网络安全防御系统的安全防御方法,以消除广义扰动对所述网络安全防御系统的影响。
PCT/CN2021/098595 2020-06-09 2021-06-07 应用于网络安全防御系统的网络安全防御方法及相关装置 WO2021249334A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/791,277 US20230033253A1 (en) 2020-06-09 2021-06-07 Network security defense method and related device applied to network security defense system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010526523.5A CN111769903A (zh) 2020-06-09 2020-06-09 应用于网络安全防御系统的网络安全防御方法及相关装置
CN202010526523.5 2020-06-09

Publications (1)

Publication Number Publication Date
WO2021249334A1 true WO2021249334A1 (zh) 2021-12-16

Family

ID=72720516

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/098595 WO2021249334A1 (zh) 2020-06-09 2021-06-07 应用于网络安全防御系统的网络安全防御方法及相关装置

Country Status (3)

Country Link
US (1) US20230033253A1 (zh)
CN (1) CN111769903A (zh)
WO (1) WO2021249334A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115632902A (zh) * 2022-09-20 2023-01-20 深圳市同芯智控技术有限公司 一种基于EtherCAT总线的数据网络系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111769903A (zh) * 2020-06-09 2020-10-13 国家数字交换系统工程技术研究中心 应用于网络安全防御系统的网络安全防御方法及相关装置
CN112699420B (zh) * 2020-12-31 2024-05-31 广州万协通信息技术有限公司 一种用于安全芯片的有源屏蔽保护装置及方法
CN112929129B (zh) * 2021-02-09 2022-07-12 中国人民解放军战略支援部队信息工程大学 基于动态冗余异构编码的数据处理系统、方法及设备
CN117240616B (zh) * 2023-11-13 2024-03-22 机械工业仪器仪表综合技术经济研究所 威胁攻击视角下网络物理生产系统一体化风险分析方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101784995A (zh) * 2007-08-23 2010-07-21 微软公司 分阶段、轻量备份系统
CN202486787U (zh) * 2012-02-27 2012-10-10 李庆宏 可通过开关电路设置硬盘读写权限的个人电脑主板
US20150113520A1 (en) * 2013-10-18 2015-04-23 Fujitsu Limited Method for confirming correction program and information processing apparatus
CN110299939A (zh) * 2019-05-09 2019-10-01 北京邮电大学 面向时分复用qkd光网络的共享保护方法和装置
CN111769903A (zh) * 2020-06-09 2020-10-13 国家数字交换系统工程技术研究中心 应用于网络安全防御系统的网络安全防御方法及相关装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040530A (zh) * 2017-03-31 2017-08-11 中国人民解放军信息工程大学 一种异构三模冗余处理器的输出判决装置及方法
CN107346272B (zh) * 2017-06-01 2020-11-17 珠海高凌信息科技股份有限公司 动态异构冗余系统的确定方法和装置
CN107483486B (zh) * 2017-09-14 2020-04-03 中国人民解放军信息工程大学 基于随机演化博弈模型的网络防御策略选取方法
CN109245854B (zh) * 2018-08-15 2022-03-01 西安电子科技大学 一种基于ai的端到端无线通信系统及方法
WO2020093201A1 (zh) * 2018-11-05 2020-05-14 北京大学深圳研究生院 基于gspn和鞅理论网络空间拟态防御的安全性建模量化方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101784995A (zh) * 2007-08-23 2010-07-21 微软公司 分阶段、轻量备份系统
CN202486787U (zh) * 2012-02-27 2012-10-10 李庆宏 可通过开关电路设置硬盘读写权限的个人电脑主板
US20150113520A1 (en) * 2013-10-18 2015-04-23 Fujitsu Limited Method for confirming correction program and information processing apparatus
CN110299939A (zh) * 2019-05-09 2019-10-01 北京邮电大学 面向时分复用qkd光网络的共享保护方法和装置
CN111769903A (zh) * 2020-06-09 2020-10-13 国家数字交换系统工程技术研究中心 应用于网络安全防御系统的网络安全防御方法及相关装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115632902A (zh) * 2022-09-20 2023-01-20 深圳市同芯智控技术有限公司 一种基于EtherCAT总线的数据网络系统

Also Published As

Publication number Publication date
US20230033253A1 (en) 2023-02-02
CN111769903A (zh) 2020-10-13

Similar Documents

Publication Publication Date Title
WO2021249334A1 (zh) 应用于网络安全防御系统的网络安全防御方法及相关装置
US11861343B2 (en) Systems, apparatus, and methods for updating a programmable device using a distributed ledger
US10615984B1 (en) Enhanced authentication method for Hadoop job containers
Xiao et al. Security and privacy in cloud computing
US8127412B2 (en) Network context triggers for activating virtualized computer applications
CN103140841B (zh) 保护存储器的部分的方法和装置
CN110520849B (zh) 改进的计算装置
US20190228135A1 (en) Method and system of state consistency protection for intel sgx
WO2021249335A1 (zh) 应用于网络安全防御系统的输入输出系统
CN110678865A (zh) 分布式软件服务的高完整性日志
US20220006613A1 (en) Secure secret recovery
Sousa et al. Proactive resilience through architectural hybridization
EP4147416B1 (en) Blockchain-based accountable distributed computing system
CN110442601B (zh) 一种Openstack镜像数据并行加速的方法和装置
Harchol et al. FTvNF: Fault tolerant virtual network functions
CN111859379B (zh) 保护数据模型的处理方法和装置
US20130185763A1 (en) Distributed processing system, distributed processing method and computer-readable recording medium
US10235238B2 (en) Protecting clustered virtual environments from silent data corruption
Yang et al. Quantitative survivability evaluation of three virtual machine-based server architectures
JP2004005377A (ja) 多重システム停止の再発防止方法
CN111859378B (zh) 保护数据模型的处理方法和装置
US9361310B1 (en) Method and system for network user access impersonation for multi-threaded backup applications
US11651090B2 (en) Terminating distributed trusted execution environment via confirmation messages
Liu et al. Trusted authentication mechanism based on dual authentication architecture in industrial IOT-based optical access network
US20240171602A1 (en) Voting as last resort access to prevent erroneous or malicious changes

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21822950

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21822950

Country of ref document: EP

Kind code of ref document: A1